Esc
System Binary Proxy Execution - T1218
(ATT&CK® Technique)
Definition
Adversaries may bypass process and/or signature-based defenses by proxying execution of malicious content with signed, or otherwise trusted, binaries. Binaries used in this technique are often Microsoft-signed files, indicating that they have been either downloaded from Microsoft or are already native in the operating system. Binaries signed with trusted digital certificates can typically execute on Windows systems protected by digital signature validation. Several Microsoft signed binaries that are default on Windows installations can be used to proxy execution of other files or commands.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.